Login / Signup
John Leach
Publication Activity (10 Years)
Years Active: 1995-2023
Publications (10 Years): 3
Top Topics
Lightweight
Cooperative
Multiscale
Mobile Agents
Top Venues
Commun. ACM
SIGMOD Rec.
SIGMOD Conference
</>
Publications
</>
Jingyu Zhou
,
Meng Xu
,
Alexander Shraer
,
Bala Namasivayam
,
Alex Miller
,
Evan Tschannen
,
Steve Atherton
,
Andrew J. Beamon
,
Rusty Sears
,
John Leach
,
Dave Rosenthal
,
Xin Dong
,
Will Wilson
,
Ben Collins
,
David Scherer
,
Alec Grieser
,
Yang Liu
,
Alvin Moore
,
Bhaskar Muppana
,
Xiaoge Su
,
Vishesh Yadav
FoundationDB: A Distributed Key-Value Store.
Commun. ACM
66 (6) (2023)
Jingyu Zhou
,
Meng Xu
,
Alexander Shraer
,
Bala Namasivayam
,
Alex Miller
,
Evan Tschannen
,
Steve Atherton
,
Andrew J. Beamon
,
Rusty Sears
,
John Leach
,
Dave Rosenthal
,
Xin Dong
,
Will Wilson
,
Ben Collins
,
David Scherer
,
Alec Grieser
,
Young Liu
,
Alvin Moore
,
Bhaskar Muppana
,
Xiaoge Su
,
Vishesh Yadav
FoundationDB: A Distributed Key Value Store.
SIGMOD Rec.
51 (1) (2022)
Jingyu Zhou
,
Meng Xu
,
Alexander Shraer
,
Bala Namasivayam
,
Alex Miller
,
Evan Tschannen
,
Steve Atherton
,
Andrew J. Beamon
,
Rusty Sears
,
John Leach
,
Dave Rosenthal
,
Xin Dong
,
Will Wilson
,
Ben Collins
,
David Scherer
,
Alec Grieser
,
Young Liu
,
Alvin Moore
,
Bhaskar Muppana
,
Xiaoge Su
,
Vishesh Yadav
FoundationDB: A Distributed Unbundled Transactional Key Value Store.
SIGMOD Conference
(2021)
Stuart James Fitz-Gerald
,
John Leach
Global Challenges for Identity Policies, Edgar A. Whitley, Gus Hosein. Palgrave MacMillan (2009), ISBN: 9780230542235.
Int. J. Inf. Manag.
31 (2) (2011)
John Leach
TBSE - an engineering approach to the design of accurate and reliable security systems.
Comput. Secur.
23 (1) (2004)
John Leach
Improving user security behaviour.
Comput. Secur.
22 (8) (2003)
John Leach
Security engineering and security RoI.
Comput. Secur.
22 (6) (2003)
John Leach
,
Peter E. Morris
Cognitive Factors in the Close Visual and Magnetic Particle Inspection of Welds Underwater.
Hum. Factors
40 (2) (1998)
John Leach
TTP concepts.
Inf. Secur. Tech. Rep.
1 (1) (1996)
John A. Blackley
,
John Leach
Security considerations in outsourcing IT services.
Inf. Secur. Tech. Rep.
1 (3) (1996)
John Leach
Dynamic authentication for smartcards.
Comput. Secur.
14 (5) (1995)